Skip to content

New guidelines for OWASP API Security Top 10 too restricted (or lack guidelines) #596

@tlohmar

Description

@tlohmar

Problem description

The PR #582 introduced more restrictive requirements into Commonalities 0.7-rc1 as required by OWASP.

For example, PR #582 introduces the general requirement "If the data type is string, maxLength property or enum construct MUST be used to constrain values.", while the OWASP issue is an "Unrestricted Resource Consumption", i.e. only on input strings, either in a queryline or path parameter or in a POST, PATCH or PUT request body. Meaning, OWASP does not require string constrains for string, which are generated by the API provider function.

Expected behavior

Review the OWASP guideline and check, whether the restrictions should only be applied to input parameters (i.e. strings or arrays or integers).
Discuss, whether restrictions should also be applied to output parameters, i.e. parameter values, which are generated by the API provider function.

Give some guidance, how to determine the restrictions. The principle can be for example, that the API specification is not restricting the deployments (e.g. recommend usage of the maximal possible value) and recommend implementations for further restricting it (with clear error code support).

Alternative solution

Additional context

Metadata

Metadata

Assignees

No one assigned

    Labels

    correctioncorrection in documentation

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions